Remove Zoldon Virus — Remove Active Infections and Restore Data

Zoldon Virus Virus image ransomware note  Encrypted extension

Zoldon virus is a newly discovered ransomware that appears to be made entirely by its operators. It does not contain code from any of the famous ransomware families. Our article contains an analysis of its features and full removal instructions showing how victims can delete the infections and restore their files.

Threat Summary

NameZoldon virus
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts sensitive information on your computer system with the Encrypted extensions and demands a ransom to be paid to allegedly recover them.
SymptomsThe ransomware will encrypt your files with a strong encryption algorithm.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Zoldon virus

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Zoldon virus.Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Zoldon Virus Virus – Distribution Ways

The Zoldon virus is a newly discovered malicious threat which does not appear to contain any code taken from any of the famous ransomware families. The captured number of samples appear to be low which gives an indication that this might be a test release. This fact does not give an indication on the main method of infection. As such we presume that the hackers behind it are going to use all popular methods.

One of them is the coordination of phishing email messages. They are made by taking the legitimate web elements of famous companies or Internet services in an attempt to confuse the victims into thinking that they have received a legitimate notification. Most of these (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum | authored by Martin Beltov. Read the original post at: